Acceptable Use Policy

In addition to the Master Service Agreement, this AUP governs the use of HRM’s services. Violation of this AUP may result in suspension or termination of your service. In the event of a dispute between you and HRM regarding the interpretation of this AUP, HRM’s interpretation, in its reasonable commercial judgment, shall govern. If you have any questions regarding this AUP, contact HRM’s at support@hrmtechno.com

HRM’s Customers may not initiate the following practices. HRM reserves the right to suspend or terminate accounts found in violation of these items with or without prior notice given and without liability.

1. Resource Abuse

HRM reserves the right to determine what constitutes resource abuse and take the appropriate action. In specific, you may not:
i.Run stand-alone, unattended server-side processes at any point in time on the server. This includes any and all daemons, such as IRCD
ii.Run any type of web spider or indexer (including Google Cash / AdSpy) on shared servers.
iii.Run any software that interfaces with an IRC (Internet Relay Chat) network.
iv.Run any bit torrent application, tracker, or client. You may link to legal torrents off-site, but may not host or store them on our shared servers.
v.Participate in any file-sharing/peer-to-peer activities
vi.Run any gaming servers such as counter-strike, half-life, battlefield1942, etc.
vii.Run corn entries with intervals of less than fifteen (15) minutes.
viii.Run any MySQL queries longer than fifteen (15) seconds. MySQL tables should be indexed appropriately.
ix.Include the URL when using PHP include functions for including a local file. Instead of including ‘http://yourdomain.com/include.php’, use ‘include.php’ or ‘/home/username/public_html/include.php’.
x.Force html to handle server-side code (like php and shtml) to help reduce usage.
xi.Use encryption protocols like Tally Vault for your data stored on shared services. Encrypting and Decrypting communications are noticeably more CPU-intensive than unencrypted communications.

2. Network Abuse

HRM does not allow, condone or authorize any forms of Network Abuse including but not limited to Denial of Service attacks, Phishing attempts, port scans, SYN Floods etc. HRM reserves full right to determine what constitutes Network Abuse and take the appropriate action against the Customer with or without prior notification and without liability. You may not engage in illegal, abusive, or irresponsible behavior, including but not limited to:

i.Run stand-alone, unattended server-side processes at any point in time on the server. This includes any and all daemons, such as IRCD
ii.Run any type of web spider or indexer (including Google Cash / AdSpy) on shared servers.
iii.Run any software that interfaces with an IRC (Internet Relay Chat) network.
iv.Run any bit torrent application, tracker, or client. You may link to legal torrents off-site, but may not host or store them on our shared servers.
v.Participate in any file-sharing/peer-to-peer activities
vi.Run any gaming servers such as counter-strike, half-life, battlefield1942, etc.
vii.Run corn entries with intervals of less than fifteen (15) minutes.
viii.Run any MySQL queries longer than fifteen (15) seconds. MySQL tables should be indexed appropriately.
ix.Include the URL when using PHP include functions for including a local file. Instead of including ‘http://yourdomain.com/include.php’, use ‘include.php’ or ‘/home/username/public_html/include.php’.
x.Force html to handle server-side code (like php and shtml) to help reduce usage.
xi.Use encryption protocols like Tally Vault for your data stored on shared services. Encrypting and Decrypting communications are noticeably more CPU-intensive than unencrypted communications.

3. Prohibited Uses

HRM does not allow, condone or authorize any forms of Network Abuse including but not limited to Denial of Service attacks, Phishing attempts, port scans, SYN Floods etc. HRM reserves full right to determine what constitutes Network Abuse and take the appropriate action against the Customer with or without prior notification and without liability. You may not engage in illegal, abusive, or irresponsible behavior, including but not limited to:

I.
Threatening Material or ContentThe Services shall not be used to host, post, transmit or retransmit any content or material that harasses others or threatens the health or safety of others. In addition, HRM reserves the right to decline to provide Services if the content of then Customer is determined by HRM to be pedophilic, harassing, blasphemous pornographic, obscene, indecent, hateful, malicious, racist or racially, ethnically objectionable, disparaging, defamatory, fraudulent, libelous, treasonous, relating or encouraging money laundering or gambling, excessively violent or promoting the use of violence, invasive of another’s privacy or otherwise harmful to others. Is otherwise malicious, fraudulent, or may result in retaliation against HRM by offended viewers;
II.
Threatening Material or ContentThe distribution, fabrication, or use of malware, including virus software, root kits, password crackers, adware, key stroke capture programs and other programs normally used in malicious activity is prohibited. Any activity designed to collect personal information (name, account numbers, usernames, passwords, etc.) under false pretense is prohibited.
III.
Threatening Material or ContentUse of the Services to infringe upon another party’s intellectual property rights is prohibited. This includes, but is not limited to, the unauthorized copying or distribution of movies, music, books, photographs, software/warez, or any other copyrighted work. Selling or offering to sell any counterfeit merchandise will result in the immediate termination of your account. Any account found to be infringing on the intellectual property rights of others will be expeditiously removed or access to the material will be disabled. Any account found to be in repeated violation of this prohibition will be suspended or terminated.
IV.
Threatening Material or Contentdeceives or misleads the addressee about the origin of such messages or communicates any information which is grossly offensive or menacing in nature; impersonate another person; is unfair or deceptive under the consumer protection laws of any jurisdiction, including chain letters and pyramid schemes;
V.
Threatening Material or Contentcreates a risk to a person’s safety or health, creates a risk to public safety or health, compromises national security, or interferes with investigation by law enforcement; terrorist websites or other sites advocating human violence and hate crimes based upon religion, ethnicity or country of origin; unlawful plans or schemes or linking to and or advertising such plans or schemes; improperly exposes trade secrets or other confidential or proprietary information of another person; promotes illegal drugs, violates export control laws, relates to illegal gambling, or illegal arms trafficking; is otherwise illegal or solicits conduct that is illegal under laws applicable to you or to HRM;
VI.
Threatening Material or ContentYou may not use a shared hosting account as a backup/storage device with the exception of one Plesk backup of the same account. Please do not take backups of your backups
VII.
Threatening Material or ContentContent “published or transmitted” via HRM’s service includes Web content, e-mail, bulletin board postings, chat, and any other type of posting or transmission that relies on any service provided by HRM. Unacceptable material on our servers include but not limited to:
a.software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer resource;
b.Topsides
c.IRC Scripts/Bots, IRCD (irc servers)
d.Proxy Scripts/Anonymizers
e.Image Hosting Scripts (similar to Photobucket or Tinypic)
f.AutoSurf/PTC/PTS/PPC sites
g.IP Scanners
h.Bruteforce Programs/Scripts/Applications
i.Mail Bombers/Spam Scripts
j.Banner-Ad services (commercial banner ad rotation)
k.File Dump/Mirror Scripts (similar to rapidshare)
l.Commercial Audio Streaming (more than one or two streams)
m.Escrow/Bank Debentures, Bank Debentures/Bank Debenture Trading Programs, Prime Banks Programs
n.Investment Sites (FOREX, E-Gold Exchange, Second Life/Linden Exchange, Ponzi, MLM/Pyramid Scheme), High-Yield Interest Programs (HYIP) or Related Sites
o.Sale or distribution of any controlled substance without prior proof of appropriate permit(s)
p.Lottery/Gambling Sites or promoting any illegal activities or which distribute or link to warez/pirated/illegal content.
q.MUDs/RPGs/PBBGs
r.Hacker focused sites/archives/programs
s.Mailer Pro
t.Push button mail scripts
u.Broadcast or Streaming of Live Sporting Events (UFC, NASCAR, FIFA, NFL, MLB, NBA, WWE, WWF, etc)
v.Tell A Friend Scripts
w.Anonymous or Bulk SMS Gateways
x.Crypto Miners
y.PayDay Loan Sites (including any site related to PayDay loans, PayDay loan affiliate progams, etc)

4. Security

i.RYou must protect the confidentiality of your password, and you should change your password periodically.
ii.You must update the programming scripts / CMS like WordPress deployed at all times.
iii.You should report to HRM as to any suspicious activity in your account, including any hacking attempts made.
iv.You must also take reasonable security precautions at your end locally, including installation of proper antivirus and antimalware in your local PC used to access the services.

5. Bulk Commercial E-Mail

Any kind of bulk emailing is strictly prohibited with shared hosting accounts. With Cloud or Dedicated hosting you must obtain HRM’s advance approval for any bulk commercial e-mail, which will not be given unless you are able to demonstrate all of the following to HRM’s reasonable satisfaction:

i.You may not send any unsolicited e-mail, either in bulk or individually, to any person who has indicated that they do not wish to receive it. Your intended recipients have given their consent to receive e-mail via some affirmative means, such as an opt-in procedure;
ii.All Bulk Emailing must be limited to send no more than 60 emails per minute.
iii.Your procedures for soliciting consent include reasonable means to ensure that the person giving consent is the owner of the e-mail address for which the consent is given;
iv.You retain evidence of the recipient’s consent in a form that may be promptly produced on request, and you honor recipient’s and HRM’s requests to produce consent evidence within 72 hours of receipt of the request.
v.You have procedures in place that allow a recipient to easily revoke their consent – such as a link in the body of the e-mail, or instructions to reply with the word “Remove” in the subject line. Revocations of consent are honored within 72 hours, and you notify recipients that their revocation of their consent will be honored in 72 hours;
vi.You must have a Privacy Policy posted for each domain associated with the mailing;
vii.You have the means to track anonymous complaints;
viii.You may not obscure the source of your e-mail in any manner. Your e-mail must include the recipient’s email address in the body of the message or in the “TO” line of the e-mail; and You otherwise comply with the CAN SPAM Act and other applicable law.
ix.These policies apply to messages sent using your HRM service, or to messages sent from any network by you or any person on your behalf that directly or indirectly refer the recipient to a site hosted via your HRM service. In addition, you may not use a third party email service that does not practice similar procedures for all its customers.
x.HRM may test and otherwise monitor your compliance with its requirements, including requesting opt-in information from a random sample of your list at any time.
xi.Websites advertised via spam (Spamvertised) may not be hosted on our servers. This provision includes, but is not limited to, spam sent via fax, phone, postal mail, email, instant messaging, or usenet/newsgroups. No organization or entity listed in the “ROKSO” may be hosted on our servers. Any User account which results in our IP space being blacklisted will be immediately suspended and/or terminated.

6. Abuse Tickets

HRM does not allow, condone or authorize any forms of Network Abuse including but not limited to Denial of Service attacks, Phishing attempts, port scans, SYN Floods etc. HRM reserves full right to determine what constitutes Network Abuse and take the appropriate action against the Customer with or without prior notification and without liability. You may not engage in illegal, abusive, or irresponsible behavior, including but not limited to:

7. Disclosure to Law Enforcement

HRM does not allow, condone or authorize any forms of Network Abuse including but not limited to Denial of Service attacks, Phishing attempts, port scans, SYN Floods etc. HRM reserves full right to determine what constitutes Network Abuse and take the appropriate action against the Customer with or without prior notification and without liability. You may not engage in illegal, abusive, or irresponsible behavior, including but not limited to:

8. Materials and Products

HRM will exercise no control whatsoever over the content of the information passing through the network or on the Customer’s websites,

i.Use of any information obtained by way of HRM is at the Customer’s own risk, and we specifically deny any responsibility for the accuracy or quality of information obtained through our services.
ii.Connection speed represents the speed of connection to HRM and does not represent guarantees of available end to end bandwidth. HRM can only guarantee within its controlled network, availability of bandwidth to Customer’s subscribed Committed Information Rate”.

9. Undertaking of the Customer

The Customer agrees and undertakes that:

i.Any attempt to undermine or cause harm to any of the equipments, materials etc. of HRM is strictly prohibited.
ii.In case of abuse of the resources including equipments, materials, network etc. of HRM, in any way, HRM reserves the unqualified right to immediately deactivate the Services, without refund.
iii.Denial of Service (DOS) attacks directed at HRM, or any attempt to launch a DOS attack from HRM servers are strictly prohibited. All infractions and or suspected infractions will be vigorously investigated and may result in immediate termination of Services.
iv.It shall ensure that its representatives and employees behave with courtesy and politeness towards employees or representatives of HRM and do not indulge in disorderly, riotous or unwelcome behavior at the HRM’s premises.
v.Customer shall not violate systems or network security measures instituted by HRM and any such violation may incur criminal or civil liability.
vi.Compliance with the Law of the Land, especially Information Technology Act 2000 and rules thereunder.
vii.HRM does not tolerate any harassment, malice or abuse towards employees. Any form of harassment, cursing, threats, or ill will directed towards HRM staff or authorized agents shall not be tolerated. The Customer agrees to conduct themselves in a professional manner regardless of the method of communication with HRM.
viii.Should the Customer be found in violation of this clause HRM reserves the right to suspend or terminate services with or without prior notice and without liability.